MaraDNS < 1.4.14 / 2.0.x < 2.0.09 Deadwood Out-of-Bounds DoS

medium Nessus Plugin ID 73484

Synopsis

The DNS server running on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the MaraDNS server running on the remote host may be running a version of Deadwood, a recursive resolver bundled with MaraDNS, which is affected by an out-of-bounds read error. This issue exists due to the lack of bounds checking in the 'DwCompress.c' and 'DwRecurse.c' source files. This issue could allow a remote attacker to crash the recursive DNS resolver, resulting in a denial of service.

Note that this only affects the Deadwood component.

Solution

Upgrade to MaraDNS version 1.4.14 / 2.0.09 or later.

See Also

http://samiam.org/blog/2014-02-12.html

http://maradns.samiam.org/security.html

Plugin Details

Severity: Medium

ID: 73484

File Name: maradns_2_0_09.nasl

Version: 1.6

Type: remote

Family: DNS

Published: 4/11/2014

Updated: 11/27/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2014-2032

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: Settings/ParanoidReport, maradns/version, maradns/num_ver

Exploit Ease: No known exploits are available

Patch Publication Date: 2/12/2014

Vulnerability Publication Date: 2/12/2014

Reference Information

CVE: CVE-2014-2031, CVE-2014-2032

BID: 65595, 65689